sysadmin - 22.2.2005 - 26.4.2005

Microsoft: everything stolen

Longhorn with Glass Effects, Desktop Search and PDF Alternative - while the interface and desktop search are clearly feature theft from OS X Tiger, the Microsoft alternative to PDF is as unnecessary as a goiter. Yes, I know that PDF is also a proprietary format - but unlike any ideas from Microsoft, it works, does exactly what it was designed for and doesn't have mountains of security holes. I don't think I necessarily want document formats whose use is dependent on Microsoft software ...

Somehow, the various Longhorn presentations and ramblings from Microsoft are becoming increasingly embarrassing. Don't they have any original ideas anymore? Even the command line in the start bar sounds more like a copy of LaunchBar or QuickSilver on the Mac ...

First Trojan for Mac OS X spotted - if there aren't any, do you write your own? Just a guess - the information at Sophos about the alleged Trojan is very thin. No information about the spread and no specific information about the removal of the Trojan, no detailed information about detecting the Trojan (port or similar) and no information about the installed files. Sorry, but this all doesn't sound very credible ...

Server Names

Dirk Steins: Server Names - apparently, you can find the Simpsons quite often. In our case, the entire production DMZ is labeled with Simpsons names. The old production systems are all named after Lucky Luke characters, which unfortunately left a gap due to server death (William was hit). Our front-end computers are named after South Park characters. And the main firewall is named Kyle, with its failover system named Evil-Kyle.

It works quite well, Kyle is a huge asshole. Only Kenny, which we initially set up as a server in front of the firewall for playing around, just so we could once shout "My God, they killed Kenny, you bastards!" - he just doesn't want to be killed ...

There are days like this ...

... on which Microsoft announces mountains of security vulnerabilities, almost all of which are associated with the execution of arbitrary code. Or Oracle names 89 security vulnerabilities in its database. And those are the days when you're glad not to use this software ...

Dvddisaster is a small program that stores error correction data for DVDs and CDs on an external medium so that a CD or DVD that has problems due to aging can still be read under certain circumstances. For this purpose, control data amounting to approximately 15% of the original data carrier is stored elsewhere.

Ongoing Topic SORBS

I already wrote about SORBS before. Not much has improved there. Today, I had a server listed in their directory again. And I wanted to know why - but you can only query the database if you are a registered and logged-in user. To become a user, you first have to answer a bunch of questions, such as phone number and address.

Ok, sorry, but you can't put it any nicer: the operators of SORBS are filter fascists. George Orwell would have had a field day with these nutcases - administrators are hindered in their work by the incompetent operation of their block lists and are then supposed to disclose their data. And of course, a user is also required for delisting.

That their web interface is a disgrace in terms of usability, I probably don't need to emphasize. Which fields are mandatory fields are only revealed in bits and pieces, which functions require registration are only known after selecting the function (and after submitting the associated form!) and various other obstacles.

And when you've jumped through their hoops, you get nonsense like this as a reason for the listing: "Likely Trojaned Machine, host running unknown trojan" - no, my machine does not have an unknown trojan installed. Presumably, the idiots have just stumbled over a port unknown to them (ports 8080, 8081 and 9999 are in use on the machine - by the way, with quite normal servers behind them) and once again brazenly claim that the machine is corrupted - but they are simply too stupid to build a usable list.

And yes, the ridiculous demand that you can only do the delisting from the listed machine itself and for that you have to run through their silly web interface again (which is quite ugly to use with Lynx - of course, on servers you probably operate graphical interfaces and VNC according to these great security experts ...).

I'll say it again: I won't go to great lengths if anyone uses this outdated and useless list on their server and emails are bounced as a result. Anyone who uses SORBS and therefore can't receive emails from me is simply too stupid for this world and can find a playground elsewhere. I've had it up to here with incompetent block list operators and incompetent mail admins who use these lame lists ...

My Firefox Extensions

New meme at Pepilog: Post Firefox extensions. Well, ListZilla makes it quite easy, here are mine:

  • [Adblock][1] 0.5.2.039
  • [Bookmarks Synchronizer][2] 1.0.1
  • [BugMeNot][3] 0.6.2 (somehow it seems not to work)
  • [Conkeror][4] 0.18
  • [Disable Targets For Downloads][5] 0.8
  • [Google Pagerank Status][6] 0.9.4
  • [Greasemonkey][7] 0.2.3
  • [Html Validator (based on Tidy)][8] 0.5.6
  • [JustBlogIt][9] 0.2
  • [ListZilla][10] 0.5.1
  • [Live HTTP Headers][11] 0.10
  • [mozcc][12] 1.0.0
  • [QuickTabPrefToggle][13] 0.0.4
  • [Resizeable Textarea][14] 0.1a
  • [SessionSaver .2][15] 0.2.1.025

Resizable Textarea

Found at fx3.org: resizeable Textarea, a plugin that allows you to resize a text field in Firefox forms if it's too small. This is very practical for someone who frequently works with web interfaces of CMS or databases.

VIA releases EPIA driver - might interest Jutta - the entire X area and the special chips are so far quite poorly documented and supported.

Police Fear Anonymity and Cryptography on the Internet

The police fear anonymity and cryptography on the internet - and therefore, for example, rail against state-funded anonymization services. However, this is simply the usual conflict of technology: the application can happen in two ways. No one talks about the reasons why anonymization services and encryption systems are quite legitimately used; only criminal use is the topic. Should we ban hammers and sickles, after all, you can kill people with both.

What is worrying about this development is that the use of cryptography will probably be restricted - or as it is called in modern German: regulated - in the short or long term. And at some point, the situation will arise where encrypted emails are already considered suspicious. Suspicion is no longer needed to spy on someone. And what is more obvious than to assume illegality of someone who encrypts their emails?

Every society must deal with abuse of the system and abuse of society - and with those who completely fall out of societal norms. This is annoying and in many cases even tragic - but cannot be changed. However, the problem is not solved by putting the entire society under general suspicion. Ultimately, what remains is a society that is no longer worth living in and preserving because everything is based on surveillance and denunciation. Restricting the rights of ordinary citizens does not result in a single fewer criminal - rather more, because more and more citizens will resist the regulations (and according to the definition of people like Otto Orwell, are then simply criminals).

What is completely ignored here, in my opinion, is the point that crime does not only consist of the perhaps technically difficult-to-access encrypted channel - there must always also be effects outside. Child pornography is not only traded on the internet - it is also produced at some point. Organized crime does not only organize the exchange of PGP keys on the internet - it organizes human smuggling, illegal gambling, drug trafficking, and who knows what else. Every crime therefore always has facets that take place quite openly and recognizably in society. Investigations are primarily carried out in this area to this day - the eavesdropping has not yet brought reproducibly better results than those already achieved through normal investigations. On the contrary: the eavesdropping, dragnet searches, and similar approaches have all failed, especially when considering the immense personnel deployments (and thus costs) of these actions. And no, the genetic sample was not decisive even in the Moshammermord case.

Regulating network technologies will not prevent their use for criminal purposes - it will only make legal use more difficult or stigmatize it. Someone who smuggles people certainly has far fewer scruples about violating cryptography laws than someone who only uses cryptography because they don't like the idea of the state reading everything.

Sun criticizes the GPL

News from the court jester:

Jonathan Schwartz, Sun's President and Chief Operating Officer (COO), once again criticizes the GPL and praises his own company as the biggest promoter of Open Source. Indirectly, Schwartz accuses other Open Source companies of lying.

At some point, this court jester must become embarrassing for the company.

RFC4041: Requirements for Morality Sections in Routing Area Drafts. A.... - exactly, this has been pending for a long time. We finally need to route in a morally correct way!

Security risk: Password protection for hard drives - yes, great, what a stupid idea by the manufacturers

deNic out of .net application?

Reading through the report at Heise, it all sounds rather like collusion in favor of VeriSign - the biggest rip-off merchant in the domain business. Pretty absurd, the whole allocation, if indeed the company that has been accused of unfair practices in recent times (pre-registration of IDN domains without basis, wildcard A-record on .com) gets the contract. I suspect the problem with deNic was simply that it is not a US company, because Internet administration is still far too US-centric.

Study Certifies Windows Better Security Than Linux

Study certifies Windows as more secure than Linux - of course, if I compare the security of RedHat and Windows and find out that the company RedHat is even slower than Microsoft, then I conclude that Linux is less secure than Windows. Because it is completely unthinkable that people who operate servers either run essential packages from upstream or get their patches from elsewhere. And there are naturally no other distributions than those of a company that charges exorbitant prices for open source and otherwise behaves in business more like Microsoft. And all of this financed by Microsoft. This is certainly a very relevant study.

The fact that it is nowhere considered whether the respective errors could actually be used for attacks and whether they are relevant for the scenario at all - who cares. Let's just throw everything into one pile. The fact that Microsoft does not publish all bugs and therefore an objective assessment of open bugs in Windows is completely impossible - who cares. The fact that it is nowhere independently documented when Microsoft was first aware of a bug and therefore an assessment of the actual duration during which one was unprotected from the respective bug is not possible - who cares. The fact that Microsoft has recently introduced bugs again (I recall the LAND attack), which had been around for a long time and that this casts a pretty bad light on their development methodology - who cares.

But how they now believe that anyone could see this as an objective measurement of vulnerability and why such things are labeled under the keyword "Research", I find really ridiculous ...

SCO Uses Legal Documents from Groklaw and Tuxrocks - wow, great, the advocates of their own intellectual property steal IP from other authors for their websites without citing the source. How embarrassing is that ...

Revenge of the Flashcards

Well, there are days in an admin's life that hurt but are necessary: I'm currently playing around with a spam filter (DSPAM) that stores its statistics in an SQL database. The spam filter supports a variety of database drivers, including PostgreSQL and MySQL, and a few other non-client-server databases (SQLite, etc.). So, out of habit, I first reached for PostgreSQL - it was already running on the machine.

Well, it was a bit slow at the beginning and the machine was a bit overloaded, but I found a few tips on the net with which one could make PostgreSQL run faster for DSPAM. After that, the computer didn't run particularly fast, but significantly faster than before. So, let it run through the night.

Well, the next day the rude awakening: tons of blocked processes, pig-slow updates against the database, deadly performance when learning a mail: 12 minutes runtime is no exception. Ouch. The database dump is already 100 MB in size at this point. The whole thing is not particularly exciting when the system load is always between 3 and 6 ... Ok, so bite the bullet and install and configure the index card box MySQL. Then bring Exim back up and sort the waiting mails. Effect: total load explosion. Loads above 30 and then at some point the watchdog struck and booted. Oh shit. All clear, let's see what's actually in the box: yeah, only 256 MB of memory and the MySQL server got massively into paging. He can't help it if I just don't have enough memory. PostgreSQL had fewer problems with that because PostgreSQL's memory management is much more static and the server doesn't grab so much memory in the basic configuration.

Ok, Jutta swapped the memory with her Linux box and now the server has 512 MB of memory, which is enough for the purpose. And the system load with MySQL is significantly better than anything before. Ok, I could certainly also bring PostgreSQL to better performance with a larger configuration, but the problem was, according to the symptoms, the massive number of parallel updates and the multi-version transaction technique of the server - that was definitely in the way in this concrete case.

Note: MySQL is still only a glorified index card box and MyISAM is definitely the dumbest table format you can choose, but no technology is so stupid that you can't need it from time to time. If the data is completely transaction-free - because the SQL server is simply being misused as a data storage without a real business data model with great referential integrity - then you should simply not use a database whose focus is exactly the opposite. In this case, MySQL and MyISAM are simply the better choice.

It's definitely better than Berkley-DB or other in-process databases, because they can only work reliably via file locking and with the massive parallel updates that DSPAM makes (it learns - depending on the setting - with every mail and updates its statistical basis) a database on a file system basis is extremely unfavorable.

Now I'll wait for the next night and see how DSPAM struggles with the nightly mail pile and how the system looks tomorrow, when several thousand mails have been processed (yes, with only two users we consume gigantic amounts of mail traffic - primarily due to mountains of spam, mountains of administrative mails from various systems and mountains of mailing lists). Let's see if the system is still as fast tomorrow as it is today. I'm afraid that with the amount of mail I will also push the MySQL base for DSPAM to the limit of the possible ...

Update: so far, things look very good with the load, so the index card box actually has the nose ahead

Microsoft on patent raid - and they simply steal ideas from the IETF Working Group on IPv6, which they were once involved in. Also a patent that, under Clements' interpretation - and possibly even that of the BMJ - of the EU Patent Directive draft would also be enforceable here. And this could cause quite a few problems when using IPv6. Of course, due to prior art, one could challenge such a thing - but someone would first have to do that and be able to afford it.

Sybase stops publishing details of security vulnerabilities - and another manufacturer who doesn't understand security

Hastymail is a webmail program that works with very minimal browser requirements and supports an essential feature that is missing in many clients: comment threading.

Know your Enemy: Tracking Botnets is a very interesting article about botnets and how they are structured - analyzed with a Honeynet.

FUD Campaign Against Linux

Linux Unsuitable for Large Enterprises? At least that's what the Agility Alliance claims. And who are they? Let's take a look at Pro-Linux:

The Agility Alliance, a coalition of various industry heavyweights such as EDS, Fuji Xerox, Cisco, Microsoft, Sun, Dell, and EMC, warns large enterprises against using Linux due to security concerns, scalability issues, and a lack of compelling cost advantages.

Ok. Microsoft. SUN. Cisco. These are, of course, three companies that are particularly predestined to recommend the use of Linux to enterprises.

Rasmussen's particular concern is the potential use of Linux on mainframes, so-called supercomputers. Here, the Agility Alliance believes that Linux does not have a compelling cost advantage over the operating systems promoted by the initiative and also has scalability issues.

Well. Where is IBM in this group - I mean, when it comes to mainframes, wouldn't it be practical if there was someone involved who actually offers real mainframes? Oh, I see, IBM does indeed promote the use of Linux on the mainframe. Well, well, the scoundrels ...

I have never understood what the fact that a Java applet has a signature has to do with trustworthiness and why it should then have extended rights. In my opinion, the whole concept of signed applets with extended rights is a dumb idea - even if the user is specifically pointed out what this means (the extended rights) - on the basis of which facts should he decide whether he trusts the applet?

SCO OpenServer 6 with a lot of Open Source - yes, this also means Open Source: that companies like SCO are allowed to use it. It's also fine: when SCO customers have first switched to all the Open Source applications and platforms, the switch to Linux will be much easier for them.

Debian plans to reduce the number of architectures - I don't know if that's such a great idea. The many architectures were one of the pro-arguments for Debian. Of course, exotic architectures can cause problems - especially when they simply can't keep up during the recompile orgies that are due for a release (I'm thinking of the 68K architecture here). Nevertheless, it's a shame if this aspect of Debian is weakened.

Time to Ditch iChat

And why? Well, AOL's strange terms of use for AIM enforce the surrender of all rights and all privacy in the data transported over the AIM network. Verbatim:

In addition, by posting Content on an AIM Product, you grant AOL, its parent, affiliates, subsidiaries, assigns, agents and licensees the irrevocable, perpetual, worldwide right to reproduce, display, perform, distribute, adapt and promote this Content in any medium. You waive any right to privacy. You waive any right to inspect or approve uses of the Content or to be compensated for any such uses.

Sorry, what? Have they gone mad? These terms of use should actually be completely illegal in Germany - I don't think you can absolve yourself of all responsibility and the user of all rights through a disclaimer ...

iChat is based on AIM as a transport network. Hence the subject. It's time to work with clients like Fire where you can switch to Jabber for example - a network of servers that, on the one hand, are not under the central control of a company and, on the other hand, can be easily expanded with your own server. Moreover, the technical protocol is better ...

The CCC also operates a Jabber server. The topic of AOL terms of use was also taken up there. The use of the server is also free of charge and no changes are currently planned. So I am now available via instant messaging at hugo at jabber.ccc.de, if I am reachable. The AIM and ICQ (also belongs to AOL!) accounts that I still have will probably be closed. Jabber accounts are now really trivial to get and there is no reason to use the outdated and proprietary protocols anymore. (Found via Ted Leung)

CherryOS Violates the GPL

Pro-Linux News: CherryOS violates the GPL:

Since the release of the commercial emulator, the free project has been busy comparing the codebase of CherryOS and PearPC. The project is now 100% sure, according to a programmer speaking to Golem.de, that the manufacturer is using the code of the free projects in an unlawful manner.

Another store that believes it can get away with GPL software unpunished. What's so hard about just adhering to licenses? Just because something is free software doesn't mean there are no conditions for use ...

Ancient LAND attack works again in current Windows - wow, Microsoft has a heart for outdated bugs and gives them a new life

Another bug in Linux security extension grsecurity - of course, something like this had to come up just when I'm writing about grsecurity, right?

OSER is a project that aims to replace Exchange while keeping Outlook. Although I don't like Outlook as one of the biggest virus and trojan vectors, it is popular in companies because of its good integration of various information services. Switching to an open source server solution can be the first step to gradually replace Outlook with other programs. However, at the moment it is still mainly vaporware - at least if you look at the websites.

Install grsecurity

I used to play around with grsecurity before, but the installation was a bit tricky - especially, you didn't know what to configure as a start and how to begin a reasonable rule-based security - the whole thing was more of a trial-and-error hopping than an understandable installation. However, for a security solution for an operating system, it is rather negative if you don't get the feeling of understanding what is happening there.

With the current versions of grsecurity, however, this has changed to a large extent. On the one hand, the patches run completely smoothly into the kernel, on the other hand there are two essential features that make the start easier: a Quick Guide and RBACK Full System Learning.

The Quick Guide provides a short and concise installation guide for grsecurity with a starting configuration for all the options that already offer a fairly good basis and excludes problematic options (which could exclude some system services). This way you get a grsecurity installation that offers a lot of protection but usually does not conflict with common system services. This is especially important for people with root servers - a wrong basic configuration could lock themselves out of the system and thus make the system unusable and a service case.

But the Full System Learning is really nice: here the RBAC engine is transformed into a logging system and it is logged which users execute what and what rights are needed for this. The whole thing is still controlled by corresponding basic configs that classify different system areas differently (e.g. ensure that the user can access everything in his home, but not necessarily everything in various system directories). You just let the system run for a few days (to also catch cron jobs) and then generate a starting configuration for RBAC from it. You can of course still fine-tune this (you should also do this later - but as a start it is already quite usable).

RBAC is basically a second security/rights layer above the classic user/group mechanisms of Linux. The root user does not automatically have all rights and access to all areas. Instead, a user must log in to the RBAC subsystem in parallel to his normal login (which happens implicitly through the system start for system services!). Rules are stored there that describe how different roles in the system have different access permissions.

The advantage: even automatically started system services are only allowed to access what is provided for in the RBAC configuration - even if they run under root rights. They only have limited capabilities in the system until they log in to the RBAC subsystem - but for this, a manual password entry is usually required for the higher roles. Attackers from the outside can indeed gain the user rights restricted by RBAC, but usually cannot get to the higher roles and therefore cannot interfere with the system as much as would be possible without RBAC.

The disadvantage (should not be concealed): RBAC is complex. And complicated. If you do something wrong, the system is locked - quite annoying for root servers that are somewhere out there in the network. You should always have fallback strategies so that you can still reach a blocked system. For example, after changes to the RBACs, comment out the automatic activation at system startup so that a reboot puts the system in a more open state in case of problems. Or have an emergency access through which you can still administer a blocked system to some extent. In general, as with all complex systems: Keep your hands off if you don't know what you're doing.

In addition to the very powerful RBAC, grsecurity offers a whole range of other mechanisms. The second major block is pax(important: here a current version must be used, in all older ones there is an evil security hole) - a subsystem that restricts buffer overflow attacks by removing the executability and/or writability from memory blocks. Especially important for the stack, as most buffer overflows start there. Pax ensures that writable areas are not executable at the same time.

A third larger block is the better protection of chroot jails. The classic possibilities for processes to break out of a chroot jail are no longer given, since many functions necessary for this are simply deactivated in a chroot jail. Especially for admins who run their services in chroot jails, grsecurity offers important tools, as these chroot jails were only very cumbersome to make really escape-proof.

The rest of grsecurity deals with a whole collection of smaller patches and changes in the system, many of which deal with better randomization of ports/sockets/pids and other system IDs. This makes attacks more difficult because the behavior of the system is less predictable - especially important for various local exploits, where, for example, the knowledge of the PID of a process is used to gain access to areas that are identified via the PID (memory areas, temporary files, etc.). The visibility of system processes is also restricted - normal users simply do not get access to the entire process list and are also restricted in the /proc file system - and can therefore not so easily attack running system processes.

A complete list of grsecurity features is online.

All in all, grsecurity offers a very sensible collection of security patches that should be recommended to every server operator - the possibility of remote exploits is drastically restricted and local system security is significantly enhanced by RBAC. There is no reason not to use the patch, for example, on root servers as a standard, given the rather simple implementation of the grsecurity patch in an existing system (simply patch the kernel and reinstall, boot, learn, activate - done). Actually, a security patch should be part of the system setup just like a backup strategy.

Now it would of course be even nicer if the actual documentation of the system was a bit larger than the man pages and a few whitepapers - and above all was up to date. This is still a real drawback, because the right feeling of understanding the system does not really set in without qualified documentation ...

How to setup WebObjects 5.1 on Linux

How to setup WebObjects 5.1 on Linux describes how to get WebObjects (the original from Apple) running under Linux - due to the Java basis of the 5.x versions, this has become significantly easier by now. Although I am naturally much more interested in the Objective-C version for Linux - Java is not the big performer on Linux in terms of performance ...

Well, for the Objective-C version, you can also fall back on SOPE (I reported), it is compatible in many areas. For using XCode, there are also project templates, so you get similar comfort during development. I have to try how it looks with ProjectBuilder.

OpenACS

OpenACS is a web application platform that is often overlooked, based on AOLServer and PostgreSQL.

OpenACS also comes with a whole set of ready-made modules - true to its name as Ars Digita Community System, it offers a whole stable of ready-made applications. A complete CMS is also included. And all of this is partly several years old - from times when other CMS projects were still dreaming of being conceived.

The AOLServer is a multithreaded web server that uses TCL as a scripting language, just as Apache is often combined with PHP. However, the AOLServer is very fast and surprisingly resource-efficient. The thing is called that for a good reason: larger parts of AOL run on the server and it originates from there. It's still worth something.

All in all, an exciting old-timer with interesting features and - due to its age - quite good documentation. But also some warts and edges that may seem a bit strange nowadays. One must keep in mind that when ACS was developed, the definition of CMS was only in its infancy.

Backup with half of the data?

Found on Schockwellenreiter, looked at and immediately dismissed as nonsense: Substance Softwares Phew. Reason:

NOTE: Phew currently doesn't backup the resource portion of files. In short you may find incomplete files on your backups (text clippings for example). This probably won't effect 99% of most peoples data but please check critical files after a backup to make sure.

This doesn't just affect rare files. All applications that use the Carbon API and don't come in bundles or need to store in bundles require the Resource Fork. With this backup software, you can't even back up a whole range of Carbon applications, as their Resource Fork is lost - and that's where the entire program code is stored.

Sorry, folks, but until this problem is fixed, it doesn't make sense to use it. I'll stick with psync and psyncX, which may have a rather primitive interface, but at least a backup to an external drive is not only complete, but even fully bootable. And they're not only free, but also open source.

Great. The company Winkhaus builds locks that use cryptographic methods to verify the authorization of a key and you can crack these with a simple magnet. Security by Stupidity ...

SCO vs. Linux: SCO demands insight into IBM's construction plans - I would be interested in the medical term that describes what the SCO management team is suffering from

SKYRiX Object Publishing Environment

The SKYRiX Object Publishing Environment is a free variant of a web application framework based on the WebObjects model. Specifically, considering that WebObjects is now migrating from Objective-C to Java, SOPE is very interesting - as it is still entirely Objective-C.

Moreover, it runs not only on OS X, but also on Linux. And of course, I like that it is based on PostgreSQL and not on this glorified index card box ...

Would be a good reason to refresh my somewhat rusty Objective-C skills. However, the documentation is still quite sparse - but you should be able to refer to the WebObjects documentation for many areas.

By the way, for Debian Sarge there is a repository with ready-made packages for SOPE. It is not yet on their homepage, only on the Freshmeat project page for SOPE.

It is, by the way, the basis for OpenGroupware.org - a groupware construction kit (according to the developers themselves). And there is a Live-CD with which you can test the whole monster without having to install much.

Can someone explain to me why I have never seen this project before? Do I have tomatoes on my eyes? Strange ...

A warning to those who want to get started (I just compiled, installed and tested everything): describing the documentation for SOPE itself as non-existent would be flattering.

Tip: a WebObjects application is so to speak a small web server in itself - you simply start it and attach Apache to it using the mod_ngobjweb module to this small mini-server, and then you can access the elements of the application. It is not immediately obvious for someone who does not know WebObjects ...

TB Quickmove and QuickFile

TB Quickmove 0.0.5a is a Thunderbird extension with which you can assign hotkeys and context menu entries to frequently used target folders to quickly move messages there without having to use drag-and-drop.

QuickFile is another extension that does the same thing.

I'll check both of them out, it's exactly what I need (found via photomatt)

Update: Unfortunately, after trying them out, it turned out that both are not usable under OS X. With TB Quickmove, you cannot select the hotkeys - the OK button doesn't work. And with Quickfile, you can select the hotkey, but it doesn't work - apart from the fact that the modifiers don't fit for OS X (what is Accel, what is Meta under OS X?). That's a shame.

Aranha server monitor

The freshmeat.net: Aranha server monitor sounds exactly like what I programmed under Servermonitoring. However, I don't use XML-RPC, but SOAP. And I didn't provide it with a XUL interface, but a web interface. And I don't use Perl, but Python. Strange.

surprised face

Mine has been running in the company for ages and faithfully performs its duty in monitoring our server zoo.

Microsoft relies on marketing for «Longhorn» - and stamps it as vaporware and a marketing show even before its existence

Billing via IP? explains more about the absurd IP-based billing procedure. The whole self-presentation is already confusing enough. The procedure itself is even more confusing. So no wonder that T-Systems hitches itself to this cart - if there are stupid ideas, they always seem to shout "Here!" ... (found at Isotopp)

And while we're on the subject of marketing lies: does anyone remember SoftRAM95? It's been 9 years now ...

IBM to drop Itanium support - nobody wants these Itanium parts. Somehow, this was quite a big flop for Intel. But if this gives the Power architecture a boost, I'm all for it.

Computer Parts Returns Documented

On www.dau-alarm.de service cases of returned computer parts are documented photographically. Very funny - although probably not for the person who had to handle the service cases.

Microsoft restricts Windows XP activation via the Internet - People, get decent operating systems whose manufacturers do not have such absurd notions of ownership. Or take the opportunity to buy a real computer.

Virtualized Servers under Linux

rHype is an IBM project that was recently published under an Open Source license (GPL). This project is essentially a virtualization machine for Linux. Comparable to IBM's LPARs for mainframes, but naturally designed for much smaller machines.

It could be the ideal complement to Xen - another GPL project for virtualization based on Linux. Taken together, both could become an interesting open source alternative to VMWare.

Virtualized servers are very interesting for many purposes, as usually only a virtual machine is lost in case of problems and the migration of services on virtual machines is easier than moving around real hardware. Better to have a few large boxes with virtualized servers on them than many smaller boxes with dedicated systems.

Virtualized servers in real use can be done with User Mode Linux today. In this case, a Linux kernel is operated as its own process under the actual hardware kernel via special APIs in user mode instead of directly on the hardware. Each virtualized machine has its own user mode kernel, its own memory, and its own virtual disk areas.

Caution with free SSL certificates

Beware of free SSL certificates - the criticism of the unchecked certificates is indeed correct. But the experts are sitting on a misconception here: why should I trust the CAs randomly delivered with my browser more than any other CA?

Of course, if I try to get a certificate from them (e.g., at the Trustcenter), I have to jump through all sorts of hoops to get the certificate. That seems very secure. But who guarantees that all certificates from this CA were issued according to the same pattern? That someone didn't feel like checking and simply confirmed a certificate without verification? Or that something was rigged?

Exactly. There is only the guarantee of the issuer. The company that issues me the certificate essentially checks itself. Of course, in Germany there are regulations for certificate authorities and, as far as I know, these include audits - but who guarantees that everything runs smoothly there? Given the level of corruption going on ...

I don't want to accuse the Trustcenter of anything here - on the contrary, we use their services in the company. But central certification authorities have a serious problem: the security and trustworthiness depend solely on the trustworthiness of the central authority. And browsers come with various certification authorities deemed trustworthy by the browser manufacturer - I don't decide that, someone else does.

This is the classic conflict between centralized certification and decentralized certification via a Web of Trust as it exists with OpenPGP or GPG. Of course, I can't trust everyone there either - but if I trust someone, I set that locally for myself. And this trust is not dependent on whether it is a large company with great boilerplate documents.

Without a Web of Trust structure, certification is still more of a facade than substance. Alongside the pearls, there are also pigs - and that's exactly what ct has found out. Great insight - we've been saying this from the PGP camp for years.

Dialer Madness - the next phase

In Dialerwahn - the next phase Isotopp reports on an IP payment system that generates paid page requests based on logged IPs and the association of these IPs with a user. So far only in use in Austria - but highly stupid. They probably have never heard of IP spoofing, but also not of anonymous proxies and tor ...

IP-based paid services must be based on some form of authorization. Either the classic password technique or better on client certificates. Anything else is highly nonsense and doomed to fail. Anyone who bases billing to end customers on the basis of the logged IP address simply does not understand TCP/IP and the Internet.

Free multidimensional OLAP server for Linux announced - could be interesting if it changes from the status announced to the status implemented.

Apache2, php5-fcgi, php4-fcgi, mod_fastcgi HowTo

Apache2, php5-fcgi, php4-fcgi, mod_fastcgi HowTo provides everything you need to know to run PHP as an FCGI process. And even in German. The little bit of Apache2 in there can be mentally converted to Apache 1.3, the Apache is actually hardly affected.

FCGI offers, in combination with suexec, the possibility to run PHP per virtual host under a dedicated user and thus the possibility in shared hosting environments to set up files in a virtual host so that another user with his PHP cannot read them. You could even run the FCGI-PHPs in a chroot jail to isolate them even more.

In addition, FCGI is often significantly more resource-efficient for PHP, as fewer PHP processes can run than Apache processes and the Apache processes do not become so bloated. If you have many virtual hosts, this can lead to the FCGI processes catching up in number - but then you should consider whether the FCGI processes should not run better on a dedicated machine.

This would be exactly the right thing for simon, especially since I could then also allow PHP for the other users.